200-310 Real Exam Dumps Questions and answers 81-90

Get Full Version of the Exam

Question No.81

Which two network services should you host on the DMZ? (Choose two)

  1. NFS

  2. WWW


  4. DHCP

  5. FTP

Correct Answer: BE

Question No.82

Which option is an advantage of a Layer 3 access model over the traditional Layer 2 access model?

  1. increased neighbor adjacencies

  2. faster convergence

  3. reduced resources on the router

  4. reduced size of routing table

Correct Answer: B

Question No.83

Which two states are RSTP port states? (Choose two.)

  1. discarding

  2. learning

  3. blocking

  4. listening

  5. disabled

Correct Answer: AB

Question No.84

Refer to exhibit. Based on the following output from the access switch, which option is the trust boundry for QoS?


  1. IP phone

  2. access

  3. core

  4. endpoint

  5. distribution

Correct Answer: E

Question No.85

Which two are types of network virtualization? (Choose two.)

  1. VSS: Virtual Switching System

  2. VRF: virtual routing and forwarding

  3. VCI: virtual channel identifier

  4. VLSM: variable length subnet masking

  5. VM: virtual machine

  6. VMP: Virtual Memory Pool

Correct Answer: AB


Network virtualization encompasses logical isolated network segments that share the same physical infrastructure. Each segment operates independently and is logically separate from the other segments. Each network segment appears with its own privacy, security, independent set of policies, QoS levels, and independent routing paths. Here are some examples of network virtualization technologies:

VLAN: Virtual local-area network VSAN: Virtual storage-area network VRF: Virtual routing and forwarding VPN: Virtual private network

VPC: Virtual Port Channel

Question No.86

Refer to the exhibit. A standard Layer 2 campus network design is pictured. Which numbered box represents the core layer?


  1. #1

  2. #2

  3. #3

  4. #4

  5. #5

Correct Answer: C

Question No.87

Which three Cisco technologies can you use to detect and mitigate threats? (Choose three.)

  1. NetFlow

  2. FWSM

  3. ISE

  4. VRRP

  5. sFLOW

Correct Answer: ABC

Question No.88

Which four services does the architecture for Media Services contain? (Choose four.)

  1. access services

  2. transport services

  3. storage services

  4. forwarding services

  5. session control services

  6. security services

  7. filtering services

  8. remote access services

Correct Answer: ABCE


An architecture framework for media services supports different models of video models. As shown in Figure 14-13, the network provides service to video media in the Media Services Framework. Those services are access services, transport services, bridging services, storage servers, and session control services, which arc provided to endpoints. Access services provide identity of end devices, mobility, and location services. Transport services provide QoS for reliable packet delivery. Bridging services provide transcoding, conferencing, and recording services of media streams.

Storage services provide capture and storage of media streams and content management and distribution.

Session control services provide session signaling and control and gateway services.


Question No.89

Which protocol is used to reserve bandwidth for the transport of a particular application data flow across the network?

  1. cRTP

  2. IEEE 802.1P

  3. RSVP

  4. LFI

  5. Auto QOS

Correct Answer: C


RSVP Signaling protocol that enables end stations or applications to obtain guaranteed bandwidth and low delays for their data flows.

Question No.90

In an enterprise Layer 2 switched network, which protocol must be running to enable link redundancy?

  1. CDP

  2. PaGP

  3. LACP

  4. STP

Correct Answer: D

Get Full Version of 200-310 Dumps